pike.git / lib / modules / SSL.pmod / Session.pike

version» Context lines:

pike.git/lib/modules/SSL.pmod/Session.pike:88:    // RFC 5246 7.4.1.4.1:    // Note: this is a change from TLS 1.1 where there are no explicit    // rules, but as a practical matter one can assume that the peer    // supports MD5 and SHA-1.    ({ HASH_md5, SIGNATURE_rsa }),    ({ HASH_md5, SIGNATURE_dsa }),    // NB: MD5 is not supported with ECDSA.    ({ HASH_sha, SIGNATURE_rsa }),    ({ HASH_sha, SIGNATURE_dsa }),    ({ HASH_sha, SIGNATURE_ecdsa }), -  -  ({ HASH_sha224, SIGNATURE_rsa }), -  ({ HASH_sha224, SIGNATURE_ecdsa }), -  ({ HASH_sha256, SIGNATURE_rsa }), -  ({ HASH_sha256, SIGNATURE_ecdsa }), -  ({ HASH_sha384, SIGNATURE_rsa }), -  ({ HASH_sha384, SIGNATURE_ecdsa }), -  ({ HASH_sha512, SIGNATURE_rsa }), -  ({ HASH_sha512, SIGNATURE_ecdsa }), +    });      //! Supported elliptical curve cipher curves in order of preference.   array(int) ecc_curves = ({});      //! The selected elliptical curve point format.   //!   //! @note   //! May be @expr{-1@} to indicate that there's no supported overlap   //! between the server and client.